This document provides an overview of privileged account management. It defines privileged accounts as those used by IT professionals to manage applications, software, and server hardware. These accounts provide elevated access levels and permissions. The document outlines how privileged accounts are prime targets for hackers because gaining access allows hackers to escalate their privileges and access sensitive data and systems. It describes how hackers typically compromise accounts by first getting an end-user's password then using that to access privileged accounts. The dangers of compromised privileged accounts are that hackers can remain undetected for long periods while performing malicious activities like stealing data and committing fraud.